A two layer model of malware propagation in a search engine context
暂无分享,去创建一个
Supeng Leng | Yuming Mao | Yijin Chen | Lei Cui | Xiaosha Chen | Yunkai Wei
[1] Marco Fiore,et al. Worm Epidemics in Vehicular Networks , 2015, IEEE Transactions on Mobile Computing.
[2] Sajal K. Das,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON MOBILE COMPUTING An Epidemic Theoretic Framework for Vulnerability Analysi , 2022 .
[3] Guanhua Yan,et al. Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.
[4] Jure Leskovec,et al. {SNAP Datasets}: {Stanford} Large Network Dataset Collection , 2014 .
[5] Min Wu,et al. Propagation model of smartphone worms based on semi-Markov process and social relationship graph , 2014, Comput. Secur..
[6] Jun Zhang,et al. Modeling and Analysis on the Propagation Dynamics of Modern Email Malware , 2014, IEEE Transactions on Dependable and Secure Computing.
[7] Yang Xiang,et al. SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks , 2019, IEEE Transactions on Dependable and Secure Computing.
[8] Angelika Bayer,et al. A First Course In Probability , 2016 .
[9] Wanlei Zhou,et al. Malware Propagations in Wireless Ad Hoc Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[10] Tianqing Zhu,et al. Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks , 2019, IEEE Transactions on Dependable and Secure Computing.
[11] Hasmukh Morarji,et al. A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts , 2017, IEEE Access.
[12] Yongzheng Zhang,et al. SMS Worm Propagation Over Contact Social Networks: Modeling and Validation , 2015, IEEE Transactions on Information Forensics and Security.
[13] Jun Zhang,et al. Modeling Propagation Dynamics of Social Network Worms , 2013, IEEE Transactions on Parallel and Distributed Systems.
[14] Song Guo,et al. Malware Propagation in Large-Scale Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.
[15] Vasileios Karyotis,et al. A Markov Random Field Framework for Modeling Malware Propagation in Complex Communications Networks , 2019, IEEE Transactions on Dependable and Secure Computing.
[16] Xiao-Yang Liu,et al. Search Engine: A Hidden Power for Virus Propagation in Community Networks , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[17] Kwang-Cheng Chen,et al. On Modeling Malware Propagation in Generalized Social Networks , 2011, IEEE Communications Letters.
[18] Yang Xiang,et al. Modeling the Propagation of Worms in Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[19] M. Newman. Power laws, Pareto distributions and Zipf's law , 2005 .
[20] Saurabh Bagchi,et al. Modeling and automated containment of worms , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).